Kevin Haubris (@kev169) 's Twitter Profile
Kevin Haubris

@kev169

I write code!!!
Views are my own!

ID: 290128142

calendar_today29-04-2011 19:38:13

1,1K Tweet

421 Takipçi

303 Takip Edilen

Perry E. Metzger (@perrymetzger) 's Twitter Profile Photo

Anyone can write complicated code. I wrote spaghetti way too complicated to understand, let alone debug, when I was starting out. What’s hard, truly hard, is writing simple code. It demands full concentration, skill, and the ability to say “no” (especially to yourself).

NSA/CSS (@nsagov) 's Twitter Profile Photo

A big shout out to our fellow NSA employees far and near for National #EmployeeAppreciationDay! Your determination to stay a step ahead of all the rest makes the world a safer place. #GivingThanks

A big shout out to our fellow NSA employees far and near for National #EmployeeAppreciationDay! Your determination to stay a step ahead of all the rest makes the world a safer place. #GivingThanks
Stuart (@magisterquis) 's Twitter Profile Photo

If you've never written a backdoor in C, I recommend it. It's a different perspective on development compared to Go/Python/Such. You end up with a much better idea of how your code interacts with the OS and what's happening when.

░J░a░s░o░n░ ░K░i░c░h░e░n░ (@jckichen) 's Twitter Profile Photo

The mark of a “real” APT is an actor that is able to make a choice as to where on the spectrum of sophistication they need to be in order to best guarantee mission success. This “adversary optionality” drives choices in implants, exploits, and infrastructure.

Profero (@proferosec) 's Twitter Profile Photo

DLL Injection is a popular attack method. However, Linux library injection not so much. Jaime Blasco / @attcyber has released a detailed blog post on how to detect such attacks presented by TrustedSec / Kevin Haubris using osquery. alienvault.com/blogs/labs-res…

Lesley Carhart (@hacks4pancakes) 's Twitter Profile Photo

Get yourself a job / gig at some point in your career where you have no access to Google - sone facility with no phones or internet allowed or accessible for one reason or another. You will be stretched in ways you didn’t think possible and read man pages you’ve only skimmed.

Jason Lang (@curi0usjack) 's Twitter Profile Photo

Hey AT&T Help - *PLEASE* consider raising the 100GB data cap on rural workers using wireless LTE hotspots (no fixed wireless here). We could use a break right about now...

TrustedSec (@trustedsec) 's Twitter Profile Photo

#TrustedSec is expanding its training with online, public offerings! Dave Kennedy shares how these instructor-led courses will help further educate our #InformationSecurity community and industry #TrainingTuesday hubs.ly/H0pg8Rl0

TrustedSec (@trustedsec) 's Twitter Profile Photo

Cobalt Strike 4.1 allows code to be run in a more #OPSEC friendly manner. Senior Research Analyst Christopher Paschen outlines less obvious restrictions of Beacon Object Files and shares his #workflow to assist anyone tasked with writing in this format! hubs.ly/H0sBKQJ0

SF Biz (@bizsiouxfalls) 's Twitter Profile Photo

Now hiring: The first leader for the newly formed Cyber Incubator and Economic Development Center at Dakota State University. siouxfalls.business/new-dsu-cyber-…

TrustedSec (@trustedsec) 's Twitter Profile Photo

Join Darkoperator | 🇺🇦 and Christopher Paschen for our next #webinar, "Using #Research to Gain Attack Intelligence," on Wednesday, November 4 at 1pm Eastern. Register now to get a glimpse into some of TrustedSec’s internal, proprietary tooling. hubs.la/H0yF--70

TrustedSec (@trustedsec) 's Twitter Profile Photo

Join Senior Research Analyst Kevin Haubris in making memories in “COFFLoader: Building your own in-memory loader or how to run BOFs” by following his process breakdown ✨#blog hubs.la/H0G_m730

Olaf Hartong (@olafhartong) 's Twitter Profile Photo

My colleague Gijs H posted an awesome blog on converting BOFs to shellcode, which enables you to use them with other/custom C2s. Shoutout to TrustedSec for the COFFLoader. medium.com/falconforce/bo… #FalconForce #RedTeam #Shellcode

freefirex (@freefirex2) 's Twitter Profile Photo

The research team TrustedSec is happy to announce we're releasing some of our previously internal bof's. Most of it is using windows API's for primitives that can build up to larger actions. If that interests you see more here github.com/trustedsec/CS-…

TrustedSec (@trustedsec) 's Twitter Profile Photo

Find out how building memory loaders can allow you to simulate BOFs for Linux and Mac using new Cobalt Strikes BOF internal functions in our newest #security #blog hubs.la/Q019vMpC0

Mike Hunhoff (@mehunhoff) 's Twitter Profile Photo

🚨 Today we're excited to release Ghidrathon, a Ghidra extension that adds modern Python 3 scripting (including Python 3.10) to Ghidra! Blog 👉 mandiant.com/resources/blog… GitHub 👉 github.com/mandiant/Ghidr…

TrustedSec (@trustedsec) 's Twitter Profile Photo

What started as a basic scanner project evolved into a comprehensive endeavor. In our latest post, Kevin Hubris reflects on XZ Utils backdoor news, exploring detection methods pre and post-upgrades. Read it now! hubs.la/Q02wlR460 #Security #Blog